News

Jul15

Account Roles to Know Within Your Organization

Access issues run the gamut. Privileged access to assets may be open, or groups providing elevated rights may house hidden users or open access groups. Proper account deprovisioning may be overlooked. Regular user login accounts may even provide administrative...
Jul02

6 Stats to Know About Privileged Access Management (PAM)

When’s the last time you really thought about privileged access? Maybe you’ve done the legwork with password vaulting. Or have built your own in-house system. But overly complex IT infrastructure, regulatory requirements and technology sprawl further...
May27

SPHEREboard 4.0 is Here, with a Newly Designed Asset Review Module (ARM)

SPHERE Technology Solutions, a global, woman-owned cybersecurity business focused on improving security and enhancing compliance, releases the latest version of its flagship SPHEREboard product with a redesigned Asset Review Module (ARM), improving the...
May15

ILTA Roadshow Recap

We've kicked off our ILTA Roadshow in two cities, NYC and Boston! In partnership with ILTA we're talking legal security, specifically what to know when implementing data governance across matter data and document management systems (DMS), with global...
Apr18

Data Duo: Document Management Systems (DMS) and Legal Data Security

Legal data systems are complex and document-intensive, involving both digital and paper-based information that is often improperly managed, displaced, and even housed on flawed or unsecured networks. Law firms face a dual conflict: the need for confidential...